RDMA/rxe: Fix responder length checking for UD request packets
According to the IBA specification:
If a UD request packet is detected with an invalid length, the request
shall be an invalid request and it shall be silently dropped by
the responder. The responder then waits for a new request packet.
commit 689c5421bfe0 ("RDMA/rxe: Fix incorrect responder length checking")
defers responder length check for UD QPs in function `copy_data`.
But it introduces a regression issue for UD QPs.
When the packet size is too large to fit in the receive buffer.
`copy_data` will return error code -EINVAL. Then `send_data_in`
will return RESPST_ERR_MALFORMED_WQE. UD QP will transfer into
ERROR state.
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
USN-6999-1 | Linux kernel vulnerabilities |
![]() |
USN-6999-2 | Linux kernel vulnerabilities |
![]() |
USN-7004-1 | Linux kernel vulnerabilities |
![]() |
USN-7005-1 | Linux kernel vulnerabilities |
![]() |
USN-7005-2 | Linux kernel vulnerabilities |
![]() |
USN-7008-1 | Linux kernel vulnerabilities |
![]() |
USN-7029-1 | Linux kernel vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 07 Oct 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:* |
|
Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 20 Dec 2024 08:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 12 Sep 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 11 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-05-04T09:19:32.485Z
Reserved: 2024-07-12T12:17:45.605Z
Link: CVE-2024-40992

Updated: 2024-08-02T04:39:56.166Z

Status : Analyzed
Published: 2024-07-12T13:15:20.497
Modified: 2025-10-07T20:07:06.290
Link: CVE-2024-40992


Updated: 2025-07-12T22:01:14Z